Unlock instant, AI-driven research and patent intelligence for your innovation.
Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
a cryptographic hash and certifiable technology, applied in the field of document processing, can solve the problems of centralized methods that are impossible, clocks which may be inaccurate, and by itself do not allow the accuracy of an ntp-generated timestamp to be verified
Active Publication Date: 2012-01-19
RICOH KK
View PDF2 Cites 12 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Peer-to-peer systems, decentralized version-control systems like “git” and other decentralized systems make centralized methods impossible.
Separate devices have their own clocks, which may be inaccurate, and keep their own logs.
However, it only allows the NTP client to accurately determine the current time.
This by itself does not allow the accuracy of an NTP-generated timestamp to be verified at a later date.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0018]A method and apparatus for providing trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes is described. In one embodiment, devices maintain a hash-connected time log and use it to timestamp (entangle) its other log entries. When two devices meet to exchange log information, they can synchronize their time logs. That is, each device makes a time-stamped log entry that contains the other log's time and log hash. This forms a “web of trust.” Thus, by exchanging the running hash, the logs are entangled, thereby yielding a partial ordering on log entries (e.g., versions, events, etc.) that represents causal ordering. In one embodiment, the entangled log is used to prove, for example, which documents or events were seen by a given device at the time a particular log entry was made.
[0019]In one embodiment, each device places bounds on their clock's accuracy, depending on its assessment of the other device's accuracy, and this in turn bounds the accu...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
A method and apparatus for creating and / or using trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes. In one embodiment, the method comprises maintaining a first, chained-hash log; associating a first clock with the chained-hash log, and entangling the first log; with a second by adding a time-stamped synchronization entry to the chained-hash log, where the synchronization entry has a second time indication associated with the second log and a hash of one or more entries in the first log.
Description
PRIORITY[0001]The present patent application is a continuation of and incorporates by reference the corresponding patent application Ser. No. 11 / 677,458, titled, “Trustworthy Timestamps and Certifiable Clocks Using Logs Linked by Cryptographic Hashes,” filed on Feb. 21, 2007.RELATED APPLICATIONS[0002]This application is related to the following applications, U.S. patent application Ser. No. 10 / 887,998, entitled Synchroninzing Distributed Work Through Document Logs, filed on Jul. 9, 2004; U.S. patent application Ser. No. 11 / 323,543, entitled Refining Based on Log Content, filed on Dec. 29, 2005; U.S. patent application Ser. No. 11 / 323,542, entitled Always On and Updated Operation for Document Logs, filed on Dec. 29, 2005; U.S. patent application Ser. No. 11 / 323,629, entitled Log Integrity Verification, filed on Dec. 29, 2005; and U.S. patent application Ser. No. 11 / 514,711, entitled Paper-Based Document Logging, filed on Aug. 31, 2006, assigned to the corporate assignee of the presen...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to View More
Patent Type & Authority Applications(United States)